bofeng17 / AIM-Interrupt-ModelingLinks
This is the source code for AIM paper (accepted to IEEE Transactions on Dependable and Secure Computing in 2023)
☆30Updated last year
Alternatives and similar repositories for AIM-Interrupt-Modeling
Users that are interested in AIM-Interrupt-Modeling are comparing it to the libraries listed below
Sorting:
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- ☆93Updated 8 months ago
- ☆66Updated 2 years ago
- Unit test firmware evaluated in P2IM paper☆10Updated 4 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- FirmSec Dataset☆43Updated 2 months ago
- ☆30Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆48Updated 7 months ago
- ☆26Updated 11 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆80Updated last year
- A Specification-Guided Approach for Firmware Emulation☆44Updated 7 months ago
- Extracting the ACFG feature of each function from the binary file based on angr☆19Updated 6 years ago
- ☆30Updated 2 years ago
- ☆71Updated last year
- ☆38Updated last year
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- Source code of SEmu-Fuzz☆22Updated last year
- Repository for monolithic firmware blobs☆87Updated 3 years ago
- ☆56Updated 7 months ago
- ☆44Updated 2 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- ☆14Updated 8 months ago
- angr's exploration technique to perform taint analysis☆64Updated 5 years ago
- ☆96Updated 2 months ago
- ☆18Updated last year
- 20 benchmark programs☆51Updated 4 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆14Updated 2 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆17Updated 9 months ago
- the datasets and source code of the paper 《LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries》☆27Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 3 years ago